Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You're telling me that a connection-oriented system with a volume a billionth of the internet can't keep logs of who initiates a connection for 5 minutes? Oh, yeah.


It does keep a log… of caller IDs. The problem isn’t the volume of data, it is that the system isn’t setup to authenticate callers so you can’t tie a spam call to any persistent identity to block


>It does keep a log… of caller IDs. The problem isn’t the volume of data, it is that the system isn’t setup to authenticate callers so you can’t tie a spam call to any persistent identity to block

Except the system is set up to authenticate callers[0] and that's been in place (at least in the US) for almost a year.

That it hasn't been as effective as it should be is another issue, but the technology exists and is (or should be) in place as specified by the law.

[0] https://www.fcc.gov/call-authentication


SMTP isn't authenticated either, and is by many measures way looser than the telephone system (which was built around managing physical wires for almost a century), and yet spam filtering has gotten pretty good?


The CNAM field in phone systems is a lot like the “from” field in an SMTP message, and the “source ip” in a IP packet. The sender can just set it to whatever they want.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: